exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 77 discussion

Actual exam question from CompTIA's PT0-002
Question #: 77
Topic #: 1
[All PT0-002 Questions]

A penetration tester gains access to a system and is able to migrate to a user process:

Given the output above, which of the following actions is the penetration tester performing? (Choose two.)

  • A. Redirecting output from a file to a remote system
  • B. Building a scheduled task for execution
  • C. Mapping a share to a remote system
  • D. Executing a file on the remote system
  • E. Creating a new process on all domain systems
  • F. Setting up a reverse shell from a remote system
  • G. Adding an additional IP address on the compromised system
Show Suggested Answer Hide Answer
Suggested Answer: CD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Manzer
Highly Voted 2 years, 7 months ago
Selected Answer: CD
Net use s. That is mapping a share, then the file is copied and ran remotely.
upvoted 15 times
Lee_Lah
2 years, 7 months ago
Can confirm D. WMIC.exe is a built-in Microsoft program that allows command-line access to the Windows Management Instrumentation. Using this tool, administrators can query the operating system for detailed information about installed hardware and Windows settings, run management tasks, and even execute other programs or commands.
upvoted 4 times
...
...
RRabbit_111
Highly Voted 2 years, 4 months ago
The penetration tester is performing the following actions: C. Mapping a share to a remote system D. Executing a file on the remote system The first command, "net use S: \192.168.5.51\C$\temp /persistent no", maps a share on a remote system (IP address 192.168.5.51) to the local system. The second command, "copy c:\temp\hack.exe S:\temp\hack.exe", copies a file (hack.exe) to the mapped share. The third command, "wmic.exe /node: "192.168.5.51" process call create "C:\temp\hack.exe"", creates a new process on the remote system (IP address 192.168.5.51) that runs the file hack.exe. A. Redirecting output from a file to a remote system: This action is not performed in the given output B. Building a scheduled task for execution: This action is not performed in the given output E. Creating a new process on all domain systems: This action is not performed in the given output F. Setting up a reverse shell from a remote system: This action is not performed in the given output G. Adding an additional IP address on the compromised system: This action is not performed in the given output
upvoted 13 times
wdmssk
8 months, 1 week ago
agree, but the second command should be: copy c:\temp\hack.exe s:\hack.exe or the first command should be corrected. I think
upvoted 1 times
...
...
[Removed]
Most Recent 2 years, 1 month ago
The two actions being performed by the penetration tester are: D. Executing a file on the remote system: The commands "copy c:\temp\hack.exe S:\temp\hack.exe" and "wmic.exe /node:"192.168.5.51" process call create "C:\temp\hack.exe"" are used to copy and execute the "hack.exe" file on the remote system. C. Mapping a share to a remote system: The command "net use S: \192.168.5.51\C$ \temp /persistent:no" is used to map a share on the remote system to a drive letter on the local system.
upvoted 1 times
...
nickwen007
2 years, 2 months ago
Net Use is a command-line utility used to map or disconnect network drives. The syntax for running the command is net use [drive letter] [UNC Path], where the UNC Path is the location of the remote shared folder. It's typically used to access files stored on remote servers or computers. The command 'net use S: \\192.168.5.51\c$\temp /persistent no' will map the folder 'C:\temp' to drive letter 'S', make the connection persistent, and not prompt the user to enter a password when connecting. The command 'copy c:\temp\hack.exe S:\temp\hack.exe' will copy the file 'hack.exe' from the local folder 'C:\temp' to the remote folder 'S:\temp'. The command 'wmic.exe /node: "192.168.5.51" process call create "c:\temp\hack.exe"' will create a process based on the file 'hack.exe' located in the folder 'C:\temp' on the remote computer with the IP address '192.168.5.51'.
upvoted 1 times
...
kloug
2 years, 3 months ago
d,f correct
upvoted 1 times
...
kloug
2 years, 3 months ago
c and f
upvoted 1 times
[Removed]
2 years, 3 months ago
C and D is correct
upvoted 2 times
...
...
masso435
2 years, 5 months ago
The copy command is incorrect. The temp folder is part of the UNC path you mapped so you would set the destination as just S: and not S:\temp.
upvoted 1 times
...
petercorn
2 years, 7 months ago
Selected Answer: CD
CD should be the correct answers.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...